Skip to main content

A New Approach towards Segmentation for Breaking CAPTCHA

  • Conference paper
Recent Trends in Computer Networks and Distributed Systems Security (SNDS 2012)

Abstract

CAPTCHAs (Completely Automated Public Turing test to tell Computers and Humans Apart) are widespread security measures on the World Wide Web that prevent automated programs from abusing online services. CAPTCHAs are designed to be easy for humans but hard for machines. Academic research into CAPTCHAs takes the form of a friendly ‘arms race’, with some researchers acting as ‘malicious users’ that try to attack and defeat the latest CAPTCHA systems automatically. Defeating a CAPTCHA requires two procedures: segmentation and recognition. Recent research shows that the problem of segmentation is much harder than recognition. The efforts to break the CAPTCHA determine its strength & thus in turn help the researcher to build stronger CAPTCHA. In order to test the strength of a particular CAPTCHA, in this paper, we have developed a universal algorithm that measures one of the parameters to measure strength of CAPTCHA. The proposed algorithm can adapt to various cases for segmenting characters from CAPTCHA image. The said algorithm is inspired from projection value of characters, concept of snake game and typical patterns of touching the characters. Experimental results prove that the proposed algorithm has improved correct segmentation rates giving accuracy of 85%.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Yan, J., El Ahmad, A.S.: Breaking Visual CAPTCHAs with Naïve Pattern Recognition Algorithms. In: 23rd Annual Computer Security Applications Conf., pp. 279–291 (2007)

    Google Scholar 

  2. Huang, S., Lee, Y., Bell, G., Ou, Z.: A Projection-based Segmentation Algorithm for Breaking MSN and YAHOO CAPTCHAs. In: Proc. World Congress Eng., vol. 1 (2008)

    Google Scholar 

  3. Chen, Y., Wang, Y.: Segmentation of Single- or Multiple-Touching Handwritten Numeral String Using Background and Foreground Analysis. IEEE Trans. Pattern Analysis Machine Intelligence 22(11), 1304–1317 (2000)

    Article  Google Scholar 

  4. Simard, P., Szeliski, R., Benaloh, J., Couvreur, J., Calinov, I.: Using Character Recognition and Segmentation to Tell Computers from Humans. In: Int’l Conference on Document Analysis and Recogntion, ICDAR (2003)

    Google Scholar 

  5. Von Ahn, L., Blum, M., Langford, J.: Telling Humans and Computer Apart Automatically. CACM 47(2) (2004)

    Google Scholar 

  6. Baird, H.S., Moll, M.A., Wang, S.Y.: ScatterType: A Legible but Hard-to-Segment CAPTCHA. In: Eighth International Conference on Document Analysis and Recognition, pp. 935–939 (August 2005)

    Google Scholar 

  7. Chew, M., Baird, H.S.: BaffleText: a human interactive proof. In: Proceedings of 10th IS&T/SPIE Document Recognition & Retrieval Conference, San Jose, CA, USA (2003)

    Google Scholar 

  8. Yan, J.: Bot, Cyborg and Automated Turing Test. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols. LNCS, vol. 5087, pp. 198–201. Springer, Heidelberg (2009)

    Chapter  Google Scholar 

  9. Coates, A.L., Baird, H.S., Fateman, R.J.: PessimalPrint: A Reverse Turing Test. Int’l. J. on Document Analysis & Recognition 5, 158–163 (2003)

    Article  Google Scholar 

  10. Pope, C., Kaur, K.: Is It Human or Computer? Defending E-Commerce with CAPTCHA. IEEE IT Professional, 43–49 (March 2005)

    Google Scholar 

  11. Chellapilla, K., Simard, P.: Using Machine Learning to Break Visual Human Interaction Proofs (HIPs). In: Advances in Neural Information Processing Systems 17, Neural Information Processing Systems (NIPS). MIT Press (2004)

    Google Scholar 

  12. Converse, T.: CAPTCHA Generation as a Web Service. In: Baird, H.S., Lopresti, D.P. (eds.) HIP 2005. LNCS, vol. 3517, pp. 82–96. Springer, Heidelberg (2005)

    Chapter  Google Scholar 

  13. Naccache, D., Whelan, C.: 9/11: Who alerted the CIA (And Other Secret Secrets). Rump session, Eurocrypt (2004)

    Google Scholar 

  14. Mori, G., Malik, J.: Recognising Objects in Adversarial Clutter: Breaking a Visual CAPTCHA. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2003, vol. 1, pp. 134–141 (June 2003)

    Google Scholar 

  15. Moy, G., Jones, N., Harkless, C., Potter, R.: Distortion Estimation Techniques in Solving Visual CAPTCHAs. In: IEEE Conference on Computer Vision and Pattern Recognition, CVPR 2004, vol. 2, pp. 23–28 (June 2004)

    Google Scholar 

  16. Casey, R.G., Lecolinet, E.: A Survey of Methods and Strategies in character segmentation. IEEE Trans. Pattern Analysis Machine Intelligence 18(7), 690–707 (1996)

    Article  Google Scholar 

  17. Chandavale, A.A., Sapkal, A.M., Jalnekar, R.M.: A framework to analyze security of Text based CAPTCHA. Int. Journal of Forensics and Computer Application 1(27), 127–133 (2010)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Chandavale, A.A., Sapkal, A. (2012). A New Approach towards Segmentation for Breaking CAPTCHA. In: Thampi, S.M., Zomaya, A.Y., Strufe, T., Alcaraz Calero, J.M., Thomas, T. (eds) Recent Trends in Computer Networks and Distributed Systems Security. SNDS 2012. Communications in Computer and Information Science, vol 335. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-34135-9_33

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-34135-9_33

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-34134-2

  • Online ISBN: 978-3-642-34135-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics